741 skills sorted by stars.
Design security controls and threat mitigations. Use for features involving auth, data, or external exposure.
Security auditing and vulnerability detection using OWASP patterns, CWE analysis, and threat modeling. Use when auditing code for...
Security best practices, OWASP compliance, authentication patterns, and vulnerability prevention
Express.js security audit patterns. Load when reviewing Express apps. Covers Helmet.js, CORS, body-parser limits, auth middleware,...
FastAPI security audit patterns. Use when reviewing FastAPI apps (fastapi imports, main.py/app.py, requirements/pyproject with fas...
Classifies inbound Telegram messages for telclaude as ALLOW/WARN/BLOCK with brief rationale.
Comprehensive security best practices, vulnerability scanning, and security guidance for development workflows with automated secu...
This skill should be used when the user requests to audit, check, or improve application security by analyzing security headers, c...
Generates security HTTP headers (CSP, HSTS, CORS, etc.) for web applications to prevent common attacks. Use when user asks to "add...
Apply security awareness during code review and implementation. Catches common vulnerabilities without requiring full security aud...
Next.js security audit patterns. Load when reviewing Next.js apps (next.config.js present). Covers NEXT_PUBLIC_* exposure, Server...
セキュリティ観測。認可漏れ、インジェクション、機密漏えい、暗号誤用、依存脆弱性を検出。Use when: 認証/認可実装、外部入力処理、依存更新、コミット前チェック、セキュリティレビューして、脅威分析が必要な時。
Use this skill when you need to perform comprehensive security vulnerability assessments on a codebase. This skill launches the se...
Security patterns for input validation, PII protection, and cryptographic operations
Security Policy Generator - Auto-activating skill for Security Advanced.Triggers on: security policy generator, security policy ge...
Security and privacy engineering
Authentication and authorization prompt templates for RBAC implementation, permissions systems, ownership verification, and author...
Simple security prompt templates for quick implementations using existing Secure Vibe Coding OS utilities. Use for straightforward...
Comprehensive security prompt templates for implementing secure features with multiple security layers. Use for complex implementa...
Security analysis and threat modeling prompt templates for STRIDE analysis, code review, OWASP compliance, and vulnerability asses...
🛡️ Comprehensive security management for festivals including crowd control, threat assessment, emergency response, and staff coor...
Implement authentication, authorization, and security controls. Use for JWT handling, API key management, RBAC, OAuth integration,...
セキュリティ診断レポートの作成と脆弱性報告の文書化を支援するスキル。脅威分析、脆弱性評価、リスク採点、レポート生成の一連のプロセスを体系化し、専門的で実用性の高いセキュリティドキュメントを作成する。Anchors:• OWASP Top 10 (2021) /...
Security vulnerability scanning, secret detection, dependency auditing, and OWASP best practices. Use when performing security aud...
Comprehensive security analysis including SAST, DAST, dependency scanning, secret detection, and vulnerability assessment. Use for...
Use when working with authentication, API routes, user input, or sensitive data. Audits code for security vulnerabilities based on...
Implement authentication, authorization, data protection, vulnerability checks, and security best practices. Use when adding authe...